نتایج جستجو برای: serpent block cipher

تعداد نتایج: 165035  

Journal: :JIPS 2015
Aly Mohamed El-Semary Mohamed Mostafa Abdel-Azim

In this paper, we propose a novel block cipher mode of operation, which is known as the counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining (CBC) block cipher mode of operation with the counter (CTR) mode in a consistent fashion. In the CC mode, the confidentiality and authenticity of data are assured by the CBC mode, while speed is achieved through the CTR mode. ...

Journal: :IACR Cryptology ePrint Archive 2006
Julien Bringer Hervé Chabanne Emmanuelle Dottax

At CMS 2006 Bringer et al. show how to conceal the algebraic structure of a “traceable block cipher” by adding perturbations to its description. We here exploit and strengthen their ideas by further perturbing the representation of a cipher towards a white box implementation. Our technique is quite general, and we apply it – as a challenging example in the domain of white box cryptography – to ...

2004
Liang Xian

The Advanced Encryption Standard (AES), also known as Rijndael is a block cipher. The National Institute of Standards and Technology (NIST) has defined five modes of operation for AES. Each of these modes has different characteristics. The five modes are: Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher FeedBack (CFB), Output FeedBack (OFB), and Counter (CTR). Only AES Counter mo...

Journal: :IACR Cryptology ePrint Archive 2004
Kai Wirt

The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a stream and a block cipher, apparently for a larger security margin. However these two algorithms share a common key. In this paper we present a fault attack on the block cipher which can be launched without regarding the stream ciph...

1994
Howard M. Heys Stafford E. Tavares

In this paper, we examine a class of block ciphers referred to as substitutionpermutation networks or SPNs. We assert that the basic SPN architecture can be used to provide an efficient implementation of a secure block cipher if the system S-boxes are carefully selected and connected with an appropriate linear transformation. Specifically, it is shown that S-boxes which possess good diffusion a...

Journal: :IEEE Transactions on Computers 2006

Journal: :IACR Transactions on Symmetric Cryptology 2018

2007
Andrey Bogdanov Lars R. Knudsen Gregor Leander Christof Paar Axel Poschmann Matthew J. B. Robshaw Yannick Seurin C. Vikkelsoe

With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, pres...

2015
Ahmed Abdelkhalek Riham AlTawy Amr M. Youssef

In this paper, we investigate the impossible differential properties of the underlying block cipher and compression function of the new cryptographic hashing standard of the Russian federation Streebog. Our differential trail is constructed in such a way that allows us to recover the key of the underlying block cipher by observing input and output pairs of the compression function which utilize...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید